Categories

“ST. PAUL, Minn.–(BUSINESS WIRE)–3M announced today that it has entered into agreements to sell the identity management business within its Traffic Safety and Security Division, to Gemalto, the world leader in digital security, for $850 million, subject to closing and other adjustments.”

What distinct problem does this solve for who and how does this create value for them?

Pi-hole prevents ads from being downloaded for every device on your network without the need to install software. This helps save bandwidth because the ads are never downloaded. In addition, it helps protects users from malvertising.

What distinct problem does this solve for who and how does this create value for them?

Undercover Pics is a steganography, encryption, and photo-sharing service that enables its users to conceal secret images inside cover photos and share them with friends. Our unique service goes beyond end-to-end encryption by protecting your important documents and images anywhere you put them; including your email account, phone, or hard drive without the need to install an app. Share passwords with a team, protect important documents, or promote your business with creative image based scavenger hunts where your customers can decode images to find clues to promotions or giveaway items.

Categories

“Cybrary, the world’s first and only no-cost cybersecurity MOOC (massive open online course) provider, has secured $1.3 million in an oversubscribed series seed financing led by Arthur Ventures and Ron Gula, Founder and Chairman of Tenable Network Security, with participation from existing investors, including Inner Loop Capital.”

Linoma Software is a Nebraska-based firm with more than 3,000 customers around the world. With Linoma’s GoAnywhere MFT™ solution, organizations centralize and secure data exchange with their business partners, customers, and employees — thanks to robust encryption and detailed audit trails.”

Categories

“Surveillance cameras have become a ubiquitous part of urban life: lamp posts, traffic signals, building corners, dash cams; they’re impossible to avoid. But in the Hennepin County Sheriff’s hopes for the future, these networks of cameras—possibly including privately owned cameras—could soon use real-time automatic facial recognition to create a database of everywhere you go.”

Categories

“A power company in the Midwest hired a group of white hat hackers known as RedTeam Security to test its defenses. We followed them around for 3 days, as they attempted to break into buildings and hack into its network, with the goal of gaining full access. And it was all much easier than you might think. Based on our experiences, it would seem that power companies need to step up their game in the fight against cyber attackers or it could be “lights out.”

Categories

Minneapolis startup Secured2 has formed a partnership to incorporate new data security technology into Microsoft’s suite of products.

The first phase of the Secured2 solution for Microsoft will be a Q2 2016 app launch for Outlook — the email client with 60 million active users that send and receive 100 billion emails daily.

CEO Daren Klum says the the Secured2 security software will then extend beyond Outlook to Office 365 and ultimately OneDrive, potentially becoming an integrated part of the Windows OS if all goes as planned. Their partnership consists of an API integration, cross marketing, and revenue sharing.

Steve Pettit & Jason Damron started the company in New Hampshire circa 2004. Eventually they repositioned and changed the name to Great Bay Software as they saw the future opportunities around endpoint security.